Debian Security Advisory

DSA-2103-1 smbind -- sql injection

Date Reported:
05 Sep 2010
Affected Packages:
smbind
Vulnerable:
Yes
Security database references:
No other external database security references currently available.
More information:

It was discovered that smbind, a PHP-based tool for managing DNS zones for BIND, does not properly validating input. An unauthenticated remote attacker could execute arbitrary SQL commands or gain access to the admin account.

For the stable distribution (lenny), this problem has been fixed in version 0.4.7-3+lenny1.

For the unstable distribution (sid), this problem has been fixed in version 0.4.7-5, and will migrate to the testing distribution (squeeze) shortly.

We recommend that you upgrade your smbind (0.4.7-3+lenny1) package.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7.orig.tar.gz
http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1.diff.gz
http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1_all.deb

MD5 checksums of the listed files are available in the original advisory.